Submit Search
Upload
IRJET - Detecting Spiteful Accounts in Social Network
•
0 likes
•
22 views
IRJET Journal
Follow
https://www.irjet.net/archives/V7/i4/IRJET-V7I4299.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 3
Download now
Download to read offline
Recommended
Insecure trends in web technologies 2009
Insecure trends in web technologies 2009
Chandrakanth Narreddy
IRJET- Phishing Web Site
IRJET- Phishing Web Site
IRJET Journal
14 cyber threats
14 cyber threats
mahesh43211
A Survey on Privacy in Social Networking Websites
A Survey on Privacy in Social Networking Websites
IRJET Journal
Phishing detection in ims using domain ontology and cba an innovative rule ...
Phishing detection in ims using domain ontology and cba an innovative rule ...
ijistjournal
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
IOSR Journals
An iac approach for detecting profile cloning
An iac approach for detecting profile cloning
IJNSA Journal
Detecting malicious URLs using binary classification through ada boost algori...
Detecting malicious URLs using binary classification through ada boost algori...
IJECEIAES
Recommended
Insecure trends in web technologies 2009
Insecure trends in web technologies 2009
Chandrakanth Narreddy
IRJET- Phishing Web Site
IRJET- Phishing Web Site
IRJET Journal
14 cyber threats
14 cyber threats
mahesh43211
A Survey on Privacy in Social Networking Websites
A Survey on Privacy in Social Networking Websites
IRJET Journal
Phishing detection in ims using domain ontology and cba an innovative rule ...
Phishing detection in ims using domain ontology and cba an innovative rule ...
ijistjournal
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
IOSR Journals
An iac approach for detecting profile cloning
An iac approach for detecting profile cloning
IJNSA Journal
Detecting malicious URLs using binary classification through ada boost algori...
Detecting malicious URLs using binary classification through ada boost algori...
IJECEIAES
IRJET- Identification of Clone Attacks in Social Networking Sites
IRJET- Identification of Clone Attacks in Social Networking Sites
IRJET Journal
762019109
762019109
IJRAT
Emp tech las-week-2
Emp tech las-week-2
Joemer Mabagos
IRJET - Profanity Statistical Analyzer
IRJET - Profanity Statistical Analyzer
IRJET Journal
IRJET- Fake Profile Identification using Machine Learning
IRJET- Fake Profile Identification using Machine Learning
IRJET Journal
Sip 140208055023-phpapp02
Sip 140208055023-phpapp02
mark scott
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET Journal
HOST PROTECTION USING PROCESS WHITE-LISTING, DECEPTION AND REPUTATION SERVICES
HOST PROTECTION USING PROCESS WHITE-LISTING, DECEPTION AND REPUTATION SERVICES
AM Publications,India
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
ijcsit
Detection and Analysis of Twitter Trending Topics via Link-Anomaly Detection
Detection and Analysis of Twitter Trending Topics via Link-Anomaly Detection
IJERA Editor
IRJET- Malicious Short Urls Detection: A Survey
IRJET- Malicious Short Urls Detection: A Survey
IRJET Journal
A survey on identification of ranking fraud for mobile applications
A survey on identification of ranking fraud for mobile applications
eSAT Journals
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
ijtsrd
External threats to information system: Malicious software and computer crimes
External threats to information system: Malicious software and computer crimes
Souman Guha
How To Catch a Phish: User Awareness and Training
How To Catch a Phish: User Awareness and Training
London School of Cyber Security
Phishing on android
Phishing on android
GenaroSantiago3
IRJET- Tweet Segmentation and its Application to Named Entity Recognition
IRJET- Tweet Segmentation and its Application to Named Entity Recognition
IRJET Journal
IRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
IRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
IRJET Journal
A DISTRIBUTED MACHINE LEARNING BASED IDS FOR CLOUD COMPUTING
A DISTRIBUTED MACHINE LEARNING BASED IDS FOR CLOUD COMPUTING
IJTRET-International Journal of Trendy Research in Engineering and Technology
IRJET- Detecting the Phishing Websites using Enhance Secure Algorithm
IRJET- Detecting the Phishing Websites using Enhance Secure Algorithm
IRJET Journal
IRJET - Chrome Extension for Detecting Phishing Websites
IRJET - Chrome Extension for Detecting Phishing Websites
IRJET Journal
IRJET- Secure Social Network using Text Mining
IRJET- Secure Social Network using Text Mining
IRJET Journal
More Related Content
What's hot
IRJET- Identification of Clone Attacks in Social Networking Sites
IRJET- Identification of Clone Attacks in Social Networking Sites
IRJET Journal
762019109
762019109
IJRAT
Emp tech las-week-2
Emp tech las-week-2
Joemer Mabagos
IRJET - Profanity Statistical Analyzer
IRJET - Profanity Statistical Analyzer
IRJET Journal
IRJET- Fake Profile Identification using Machine Learning
IRJET- Fake Profile Identification using Machine Learning
IRJET Journal
Sip 140208055023-phpapp02
Sip 140208055023-phpapp02
mark scott
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET Journal
HOST PROTECTION USING PROCESS WHITE-LISTING, DECEPTION AND REPUTATION SERVICES
HOST PROTECTION USING PROCESS WHITE-LISTING, DECEPTION AND REPUTATION SERVICES
AM Publications,India
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
ijcsit
Detection and Analysis of Twitter Trending Topics via Link-Anomaly Detection
Detection and Analysis of Twitter Trending Topics via Link-Anomaly Detection
IJERA Editor
IRJET- Malicious Short Urls Detection: A Survey
IRJET- Malicious Short Urls Detection: A Survey
IRJET Journal
A survey on identification of ranking fraud for mobile applications
A survey on identification of ranking fraud for mobile applications
eSAT Journals
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
ijtsrd
External threats to information system: Malicious software and computer crimes
External threats to information system: Malicious software and computer crimes
Souman Guha
How To Catch a Phish: User Awareness and Training
How To Catch a Phish: User Awareness and Training
London School of Cyber Security
Phishing on android
Phishing on android
GenaroSantiago3
IRJET- Tweet Segmentation and its Application to Named Entity Recognition
IRJET- Tweet Segmentation and its Application to Named Entity Recognition
IRJET Journal
What's hot
(17)
IRJET- Identification of Clone Attacks in Social Networking Sites
IRJET- Identification of Clone Attacks in Social Networking Sites
762019109
762019109
Emp tech las-week-2
Emp tech las-week-2
IRJET - Profanity Statistical Analyzer
IRJET - Profanity Statistical Analyzer
IRJET- Fake Profile Identification using Machine Learning
IRJET- Fake Profile Identification using Machine Learning
Sip 140208055023-phpapp02
Sip 140208055023-phpapp02
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
HOST PROTECTION USING PROCESS WHITE-LISTING, DECEPTION AND REPUTATION SERVICES
HOST PROTECTION USING PROCESS WHITE-LISTING, DECEPTION AND REPUTATION SERVICES
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
Detection and Analysis of Twitter Trending Topics via Link-Anomaly Detection
Detection and Analysis of Twitter Trending Topics via Link-Anomaly Detection
IRJET- Malicious Short Urls Detection: A Survey
IRJET- Malicious Short Urls Detection: A Survey
A survey on identification of ranking fraud for mobile applications
A survey on identification of ranking fraud for mobile applications
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
External threats to information system: Malicious software and computer crimes
External threats to information system: Malicious software and computer crimes
How To Catch a Phish: User Awareness and Training
How To Catch a Phish: User Awareness and Training
Phishing on android
Phishing on android
IRJET- Tweet Segmentation and its Application to Named Entity Recognition
IRJET- Tweet Segmentation and its Application to Named Entity Recognition
Similar to IRJET - Detecting Spiteful Accounts in Social Network
IRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
IRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
IRJET Journal
A DISTRIBUTED MACHINE LEARNING BASED IDS FOR CLOUD COMPUTING
A DISTRIBUTED MACHINE LEARNING BASED IDS FOR CLOUD COMPUTING
IJTRET-International Journal of Trendy Research in Engineering and Technology
IRJET- Detecting the Phishing Websites using Enhance Secure Algorithm
IRJET- Detecting the Phishing Websites using Enhance Secure Algorithm
IRJET Journal
IRJET - Chrome Extension for Detecting Phishing Websites
IRJET - Chrome Extension for Detecting Phishing Websites
IRJET Journal
IRJET- Secure Social Network using Text Mining
IRJET- Secure Social Network using Text Mining
IRJET Journal
IRJET- Design and Development of a System for Predicting Threats using Data S...
IRJET- Design and Development of a System for Predicting Threats using Data S...
IRJET Journal
IRJET- Minimize Phishing Attacks: Securing Spear Attacks
IRJET- Minimize Phishing Attacks: Securing Spear Attacks
IRJET Journal
AGGRESSION DETECTION USING MACHINE LEARNING MODEL
AGGRESSION DETECTION USING MACHINE LEARNING MODEL
IRJET Journal
OFFTECH TOOL AND END URL FINDER
OFFTECH TOOL AND END URL FINDER
IRJET Journal
IRJET - Analysis of Fake Ranking on Social Media: Twitter
IRJET - Analysis of Fake Ranking on Social Media: Twitter
IRJET Journal
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
IRJET Journal
IJET-V3I2P6
IJET-V3I2P6
IJET - International Journal of Engineering and Techniques
IRJET- Recognizing User Portrait for Fraudulent Identification on Online ...
IRJET- Recognizing User Portrait for Fraudulent Identification on Online ...
IRJET Journal
IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...
IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...
IRJET Journal
IRJET- Monitoring Suspicious Discussions on Online Forums using Data Mining
IRJET- Monitoring Suspicious Discussions on Online Forums using Data Mining
IRJET Journal
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
IRJET Journal
IRJET- Sky Shield: A Sketch-Based Defense System against Application Laye...
IRJET- Sky Shield: A Sketch-Based Defense System against Application Laye...
IRJET Journal
IRJET- Private Social Media and Data Security
IRJET- Private Social Media and Data Security
IRJET Journal
Terrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data Mining
IRJET Journal
My Privacy My decision: Control of Photo Sharing on Online Social Networks
My Privacy My decision: Control of Photo Sharing on Online Social Networks
IRJET Journal
Similar to IRJET - Detecting Spiteful Accounts in Social Network
(20)
IRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
IRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
A DISTRIBUTED MACHINE LEARNING BASED IDS FOR CLOUD COMPUTING
A DISTRIBUTED MACHINE LEARNING BASED IDS FOR CLOUD COMPUTING
IRJET- Detecting the Phishing Websites using Enhance Secure Algorithm
IRJET- Detecting the Phishing Websites using Enhance Secure Algorithm
IRJET - Chrome Extension for Detecting Phishing Websites
IRJET - Chrome Extension for Detecting Phishing Websites
IRJET- Secure Social Network using Text Mining
IRJET- Secure Social Network using Text Mining
IRJET- Design and Development of a System for Predicting Threats using Data S...
IRJET- Design and Development of a System for Predicting Threats using Data S...
IRJET- Minimize Phishing Attacks: Securing Spear Attacks
IRJET- Minimize Phishing Attacks: Securing Spear Attacks
AGGRESSION DETECTION USING MACHINE LEARNING MODEL
AGGRESSION DETECTION USING MACHINE LEARNING MODEL
OFFTECH TOOL AND END URL FINDER
OFFTECH TOOL AND END URL FINDER
IRJET - Analysis of Fake Ranking on Social Media: Twitter
IRJET - Analysis of Fake Ranking on Social Media: Twitter
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
IJET-V3I2P6
IJET-V3I2P6
IRJET- Recognizing User Portrait for Fraudulent Identification on Online ...
IRJET- Recognizing User Portrait for Fraudulent Identification on Online ...
IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...
IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...
IRJET- Monitoring Suspicious Discussions on Online Forums using Data Mining
IRJET- Monitoring Suspicious Discussions on Online Forums using Data Mining
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
IRJET- Sky Shield: A Sketch-Based Defense System against Application Laye...
IRJET- Sky Shield: A Sketch-Based Defense System against Application Laye...
IRJET- Private Social Media and Data Security
IRJET- Private Social Media and Data Security
Terrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data Mining
My Privacy My decision: Control of Photo Sharing on Online Social Networks
My Privacy My decision: Control of Photo Sharing on Online Social Networks
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
rakeshbaidya232001
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
rehmti665
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
humanexperienceaaa
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
NikhilNagaraju
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
srsj9000
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
purnimasatapathy1234
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
Suhani Kapoor
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
Asutosh Ranjan
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
upamatechverse
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
ranjana rawat
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
João Esperancinha
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
Call Girls in Nagpur High Profile
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
pranjaldaimarysona
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
GDSCAESB
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Dr.Costas Sachpazis
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
ranjana rawat
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Dr.Costas Sachpazis
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
upamatechverse
Extrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
120cr0395
Recently uploaded
(20)
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
Extrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
IRJET - Detecting Spiteful Accounts in Social Network
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1576 Detecting Spiteful Accounts in Social Network V. Vidya Sagar1, B. Monica2, V. Kavya3, P. Gayathri4 1Assistant Professor, Dept. of Information Technology, Andhra Loyola Institute of Engineering and Technology, Andhra Pradesh, India 2Undergraduate Student, Dept. of Information Technology, Andhra Loyola Institute of Engineering and Technology, Andhra Pradesh, India 3Undergraduate Student, Dept. of Information Technology, Andhra Loyola Institute of Engineering and Technology, Andhra Pradesh, India 4Undergraduate Student, Dept. of Information Technology, Andhra Loyola Institute of Engineering and Technology, Andhra Pradesh, India ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - In the course of the most recent couple of years, Online Social Networks (OSNs) for example, Facebook, and Twitter have encountered exponential development in both profile enrollments and social associations. These systems permit individuals to share diverse data going from news, photographs, recordings, individual data or research exercises. The rapid growth of OSNs has triggered a dramatic rise in malicious activities including spamming, phishing, fake account creations and malware circulation. However, building an effective recognition framework that can identify spiteful accounts, as well as their suspicious practices on social networks, has been quite challenging. Specialists have proposed various methods and strategies to recognize spiteful accounts. By taking those features as a study, this framework will help in detecting malicious accounts in social networks. The proposed methods, features, and their confinements are analyzed and Key issues, challenges that require significant research endeavors are taken into consideration to classify the spiteful accounts. The paper distinguishes the significant future research areas with the point of advancing the improvement of malicious account detection by using the framework in OSNs. Key Words: Online Social Networks, spiteful accounts, framework, malicious activities, fake accounts. 1. INTRODUCTION Social network sites like Facebook, Twitter, and Google+ are experiencing incredible growth in users. There are more than a million users and increasing day by day. Besides just creating a profile and linking with friends, the social networks are now building platforms to run their organization, business, etc. These platforms are built based on the user profile details. These social applications are soon becoming an example of online communication which makes use of the user’s private information and activities in social links for various services. Social networks are a popular means of communication among internet users. People are heavily relying on online interactions. The internet is giving different options to create and maintain contacts and relations for the user. With the introduction of social media networks, these options have become even easier to be used. Due to this heavy use of social media networks, a certain group of internet users called cybercriminals take this opportunity for doing threats. Another means of attack by cybercriminals is the misuse of videos, images, and links shown by the user. Cyber attacks primarily occur on social networks. Popular sites such as Facebook and Twitter currently have millions of active users. The popularity of social networks makes them exciting for executing malicious activities. Due to the huge popularity of social media networks, this makes it easy for cybercriminals to misuse them. These can be in the form of media, thread or malicious post which does not belong to a user. These posts upon clicking will take the user to some other pages created by malicious users. Cybercriminals create interesting posts that are actually baits that will be attracted by some users. Typical social engineering plans include the use of Interesting posts that ride on seasonal events, celebrity news and even disasters. Attackers upload malicious posts in the season of special events and disasters. They will upload malicious posts that are related to these events and misguide users to click those links. Users who click the links by mistake act as an adversary to the attacker because the malicious posts would automatically re-posts the malicious contents such as links, images or videos on the user profile. Another popular version of this attack results in user profiles to "like" a Facebook page without their knowledge. In some cases the spammed posts will lead the users to survey sites which will result in cyber criminals getting profit. 1.1 Existing system Utilizing content investigation to distinguish suspicious clients in online networking presents a significant test in which some methods are: Sazzadur Rahman has created FRAppE, an exact classifier for distinguishing malignant Facebook applications. Most curiously, he featured the rise of
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1577 appnets—enormous gatherings of firmly associated applications that advance one another. In addition, Lin et al was keen on deciding the occasions that are of interest to interpersonal organizations clients dependent on their writing information. Right now gathered data from the web, online networks, and informal communities Sakaki et al.analyze the constant association of miniaturized scale blogging occasions particularly on Twitter. As they would see it the client might be considered as a sensor to screen tweets presented as of late and on identify various occasions. Justin Ma et al. have shown the capability of a classifier dependent on suspicious URLs . They train their dataset on properties, for example, have name length, generally speaking URL length, and the tally of the subspace isolating character (.). Consolidating these lexical highlights with data (for example DNS vault information), the specialists report a precision pace of over 95%. 1.2 Proposed system There exists a wide range of malicious content on OSNs today. These include phishing, advertising campaigns, content originating from compromised profiles, artificial reputation gained through fake likes, etc. We do not intend to address all such attacks. We focus our analysis on identifying text posts, malicious URL and creating automated means to detect such posts in real time, without looking at the landing pages of the URL. 1.3 Advantages of Proposed system ● Easy identification of Malicious posts. ● Possibility of listing Spiteful users. ● Maintains database of Malicious users. ● Does not allow to violate social networking values. 2. ARCHITECTURE The newly designed architecture for OSN is as follows: This architecture explains the detection of spiteful accounts by directing it to admin in social networks. User: Any person who can create an account in a social network and can be able to use its features. The features include posting content (such as images, URLs, text, videos etc.), connecting to friends, sending messages. Login: Login credentials include details like USERNAME and PASSWORD. Without these the user can not login in to the website. Posting content/Messaging: The verified user will be allowed to post the content in timeline and connect to people. Detection Mechanism: It consists of simple code which helps in detecting malicious content in the posts using some set of parameters. User Login Posting content/ Detection Mechanism Malicious Post Non- malicious post Post direct to Admin Post Successfull y
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1578 Malicious post/Non-malicious post: If the posted content consists of any inappropriate or virus injected content then they are considered as malicious post otherwise non-malicious. Admin: The person who maintains the entire database of spiteful accounts. 3. SYSTEM REQUIREMENTS 3.1 Software Requirements: ● Area: Data Mining ● Language: SQL ● Methods: Classification, Decision Trees ● Platform: Oracle 3.2 Hardware Requirements: ● Operating System: Windows/Linux ● Ram: 4GB ● Hard Disk Space: 80GB CONCLUSION This paper tends to the content-based cyber bullying identification issue, where powerful and discriminative portrayals of messages are basic for a viable discovery framework. By planning semantic dropout commotion and upholding sparsity, we have created a semantic-improved minimized denoising autoencoder as a particular portrayal learning model for cyberbullying identification. Furthermore, word embeddings have been utilized to naturally extend and refine pernicious substance word records. The presentation of our methodologies has been tentatively checked through two cyberbullying corpora from social media: Facebook, Twitter, and MySpace. As a subsequent stage, we are wanting to additionally improve the heartiness of the scholarly portrayal by considering word request in messages. REFERENCES [1] Manuel Egele, Gianluca Stringhini, Christopher Kruegel , “COMPA Detecting Compromised Accounts on Social Networks” NDSS Symposium 2013, Carnegie Mellon University, Pittsburgh, PA [2] Neeraja M, John Prakash, “Detecting Malicious Posts in Social Networks Using Text Analysis”, Journal of Theoretical & Applied Information Technology. 3/31/2015, Vol. 73 Issue 3, p405-410. 6p. [3] Y. Wang and S. D. Mainwaring, “Human-currency interaction: learning from virtual currency use in china,” in Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 2008, pp. 25–28. [4] J. S. Gans and H. Halaburda, “Some economics of private digital currency,” Rotman School of Management Working Paper, no. 2297296, 2013.
Download now